
Chicago
CISO Community
Virtual Executive Summit
December 2, 2020 | 8:00am - 4:00pm CST
December 2, 2020 | 8:00am - 4:00pm CST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Chicago CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Governing Body Co-Chairs

Waqas Akkawi
SIRVA Worldwide
VP, CISO

Amy Bogac
CF
Director, Information Security and Risk Management

Jim Cameli
Walgreens Boots Alliance
VP & Global Chief Information Security Officer

JJ Markee
Baxter
Chief Information Security Officer

Arlan McMillan
Kirkland & Ellis
Chief Security Officer

Paolo Vallotti
Mondelez International
Global Chief Information Security Officer
Agenda
December 2, 2020
11:00am - 12:00pm CST Virtual Summit Boardroom
Navigating the Application and Network Threat Landscape
Hosted by Radware

Elizabeth Ogunti
CISO
JBT Corporation

Paolo Vallotti
Global Chief Information Security Officer
Mondelez International

Venkat Thummisi
Global Cyber Security Market Strategist
Radware
Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise networks, applications and cloud services. Yet that coherent user experience masks a complex attack surface, where security leaders must tackle a spectrum of vulnerabilities while preserving agile business operations.
Join this session to discuss:
- The latest threat landscape for networks and applications
- How CISOs are navigating the balance of business agility and security controls
- Best practices for monitoring threats across complex networks
11:00am - 12:00pm CST Virtual Summit Boardroom
Cloud IAM — Enlightenment or Inferno
Hosted by DivvyCloud by Rapid 7

Brian Ekkebus
Sr. IT Manager of Security, Audit & Compliance
USG

JJ Markee
Chief Information Security Officer
Baxter

Brian Johnson
SVP, Cloud Security Practice
DivvyCloud
A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?
In this session, you will discuss:
- Why managing cloud IAM is so complex
- The challenges cloud IAM creates for IT and cybersecurity professionals
- How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach
11:00am - 12:00pm CST Virtual Summit Boardroom
Aligning Security Priorities for a More Secure 2021
Hosted by Verizon

Erik Hart
CISO
Cushman & Wakefield

Frank Yanan
SVP / Business Information Security Officer
Bank of America

David Grady
Chief Security Evangelist
Verizon
In cybersecurity, there is so much to do and so little time. It is critical to prioritize your investment and efforts to combat the most likely and most potentially-damaging threats to your organization. Dive into how to use data, research and their hard-earned experience to set your own security priorities for 2021.
During this session, security leaders will share their insights on:
- How to strengthen your security team and improve engagement and retention
- Avoiding buzzwords and focus on the true value of emerging technologies
- Identifying the risks that are most impactful to your organization
11:00am - 12:00pm CST Virtual Summit Boardroom
Security Operations – Empowering Teams
Hosted by Arctic Wolf Networks

Sam McLane
Chief Technology Services Officer
Arctic Wolf Networks

Nathan Zimmerman
Sr. Information Security Officer
The Y - YMCA
Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. For smaller companies, the challenge may be having to do more, with less. Rather than eliminating the need for security talent, the use of a security operations team is freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.
Join this session to learn:
- The role of automation and orchestration in today’s security stack
- How the dispersion of the workforce has caused an increase in compromises
- How-to stay vigilant in the face of Account Takeover Attacks (ATO)
12:00pm - 12:45pm CST Virtual Summit Keynote
Tomorrow’s Cyberthreats – Staying One Step Ahead
Hosted by Cybereason

Richard Rushing
CISO
Motorola Mobility LLC

Sam Curry
Chief Security Officer
Cybereason
At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.
Join this virtual keynote to explore:
- Strategies for addressing the emerging threat landscape
- The role today’s CISO plays in guiding business strategy to mitigate risk
- Communication strategies for educating users about security – and holding them accountable
12:45pm - 1:15pm CST Networking
Community Networking - Insights and Ideas for 2021
Hosted by Verizon

Amy Bogac
Director, Information Security and Risk Management
CF

David Grady
Chief Security Evangelist
Verizon
An informal and interactive opportunity for you to network with peers in small groups.
8:00am - 8:45am CST Virtual Summit Keynote
Defending Your Data in a Remote Working World
Hosted by Proofpoint

Amy Bogac
Director, Information Security and Risk Management
CF

Ricardo Lafosse
CISO
Kraft Heinz

Ryan Kalember
EVP, Cybersecurity Strategy
Proofpoint
It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.
Join Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint as he and a CISO panel discuss:
- How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
- The ways in which remote work and the move to the cloud has changed the nature of threats to data
- Approaches to better detect and respond to risky user actions with sensitive data
8:45am - 9:00am CST Break
9:00am - 10:00am CST Virtual Summit Boardroom
Utilizing a Network Digital Twin to Reduce Risk
Hosted by Forward Networks

Shane Hibbard
Director of Information Security
Invenergy

Ken Townsend
VP, CISO
R1 RCM

Brandon Heller
Co-Founder & CTO
Forward Networks
Gartner is anticipating a big surge in digital twin usage over the next 5 years; and mention digital twins for the network, in particular. More than ever before, your business depends on network availability and performance. Exploring resources, such as a digital twin, enables network operators to reduce outages, drastically improve troubleshooting measures, and eliminate errors.
Join this boardroom session to discuss:
- How today’s security teams can leverage a network digital twin to streamline operations
- Methods to more effectively collaborate
- Best practices to reduce risk
9:00am - 10:00am CST Virtual Summit Boardroom
The Changing Face of Insider Threat
Hosted by Exabeam

Victor Hsiang
Information Security Director
GATX

Ralston Simmons
CISO
William Blair & Company

Gorka Sadowski
Chief Strategy officer
Exabeam
As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly insider threat programs now maturing – evolving into amore justifiable and friendly trusted insider program.
Join this virtual boardroom to discuss:
- The evolving landscape of insider threats and its challenges
- The impact of changing behaviors, employee culture and workplace environment on insider risk
- Practical strategies for improving an insider risk management program
9:00am - 10:00am CST Virtual Summit Boardroom
Bringing Cloud Back Down to Earth
Hosted by IBM

Mahmood Khan
SVP & Global CISO
CNA

Bill Podborny
CISO
Constellation Brands

Mike Spisak
Distinguished Engineer, Master Inventor, CTO IBM Security Garage
IBM
CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. With the security and success of the organization at stake, CISOs must know how to ask the right questions and “talk cloud” with the rest of the organization – all while avoiding being seen as “the office of ‘no.’”
Join this session to learn:
- The latest solutions for effective security in the cloud
- Strategies to transfer legacy information security governance to a cloud paradigm
- Frameworks to evaluate hybrid on-prem and cloud approaches where appropriate
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
9:00am - 10:00am CST Virtual Summit Boardroom
SAP Security 101 — 5 Things Every CISO Should Be Doing to Secure SAP
Hosted by Onapsis, Inc.

Roberto Gutierrez
CISO
OSI

Justin Metallo
CISO
Volkswagen Financial Services

Jason Frugé
VP, Business Application Cyber Security
Onapsis
Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, those applications enable the most critical business functions of your organization, such as financials, ERP, CRM, HR, manufacturing and the supply chain. With SAP as the core framework of many large enterprises, it presents an attractive target for malicious actors. Building from basic security hygiene up to advanced concepts, you as the CISO can play a core role in ensuring that strategic operations and processes of your business are protected.
Join this session to learn:
- How and why you should include SAP security in your overall cybersecurity strategy
- Fundamental concepts for SAP mission-critical application cybersecurity & compliance
- Methods for achieving continuous compliance across SAP applications
- Strategies for measuring and mitigating risk throughout your SAP landscape
10:00am - 10:45am CST Virtual Summit Keynote
The Convergence of Zero Trust and SASE
Hosted by Netskope

Robert Schuetter
Chief Information Security Officer
Ashland

Jason Clark
Chief Strategy Officer
Netskope
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of planning both SASE and zero trust implementations
- Insights from organizations adopting SASE and zero trust today
10:45am - 11:00am CST Break
2:30pm - 4:00pm CST Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.
Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.
- Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Chicago CISO Virtual Executive Summit peers.
- All conversations are private and will not be recorded
- Meet up to 3 peers based on your shared interests or priorities
Participant Testimonials
- ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
- ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
- ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes
How to Participate
Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from evanta@delegateselect.com.
December 2, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.